Tag Archives: Hesperia

In December 2018, news about a massive data breach of networks used by Marriott International prompted United States Secretary of Commerce Wilbur Ross to comment on the matter. In response to a question presented by financial news network CNBC about the Marriott incident, which compromised the personal information of up to 500 million hotel guests…

According to statistics compiled by the United States Federal Emergency Management Agency, 90 percent of small business owners whose companies go through a disaster are forced to shut down operations unless they are able to get back up an running in less than a week after the catastrophe. Disaster recovery planning is a crucial business…

Even though Black Friday and Cyber Monday are generally known as the busiest shopping days of the year, a heavy online retail activity is expected to continue throughout Decembers, and this translates into a greater potential for cybercrime. Data breaches and network intrusion attacks are often launched against e-commerce websites during the holidays, and this…

One of the main goals of the Health Insurance Portability and Accountability Act is to protect the privacy and integrity of patient health information, particularly when it is handled in electronic formats. Business entities that deal with protected health information in the United States are expected to comply with certain HIPAA guidelines, and this goes…

Very few companies these days are able to operate without a technology platform. In California, even micro companies such as food truck operators and small enterprises such as family need some level of IT infrastructure or functionality. Once a business begins to rely on technology for day-to-day operational purposes, even the slightest IT setback can…

Many people think of cloud computing strictly as a solution that involves entrusting third parties to manage their business data, but this is only one aspect of the cloud. When you pay for an Office 365 subscription, for example, you are using a public cloud solution and trusting Microsoft with your data. The Benefits of…

Information security researchers who study the actions and behavior of sophisticated hackers use the term “cyber kill chain” to describe some of the strategies used in modern cybercrime. To a certain extent, the cyber kill chain is similar to strategies used by military units and career thieves who take pride on pulling off complex heights.…

Mylobot is the name given to a new malware strain that appears to be targeting enterprise servers across the United States. According to information security firm Deep Instinct, Mylobot has the characteristics of malicious code that could be used to infect computers for the purpose of recruiting them into a botnet; further intentions by the…

According to a recent advisory published by the Federal Bureau of Investigation, small business owners in the High Desert should reboot their routers to minimize their exposure to a new cyber threat. What Businesses Are at Risk for Unsecure Data? The routers affected by VPNFilter include those manufactured by popular brands such as NETGEAR and…

A report about the state of enterprise computing presented during the recent RSA Conference on digital security revealed a sobering statistic: a quarter of all American businesses using public cloud solutions have suffered data breaches. According to McAfee, a respected name in network security, data theft has affected one out of every four companies that…